HomeVulnerabilityHow Amazon CISO Amy Herzog responds to cybersecurity challenges

How Amazon CISO Amy Herzog responds to cybersecurity challenges

First, “we take a working backwards strategy to product growth. Because of this we begin by understanding our clients’ wants and construct our merchandise round them. From design time ahead, our security and product groups work collectively to make sure our merchandise meet our clients’ expectations for security.” 

The subsequent step is to take a seat with the scientists and brainstorm their priorities to determine who does which a part of the safety. “A part of our mantra is that we usher in security specialists early on this course of, in order that they’re a part of the design and product groups and are very a lot collaborative companions, as an alternative of addressing security in a while within the growth course of,” Herzog tells CSO. 

This final level is unfortunately all too typical for a lot of different firms as a result of it places security at odds with product growth. “This implies a security assessment is doing code scanning to seek out and repair stuff on the final minute,” she stated. “As an alternative, we do scans all through the coding lifecycle. Whereas it’s more durable to do that, it supplies a constructive suggestions loop and produces higher and quicker outcomes and has the additional benefit of getting the security crew feeling a part of the event course of as simply one other builder,” moderately than some management level that would arrange a extra adversarial place. “Our objective is to have interaction early and infrequently with the product crew.” Name it the Chicago voting fashion of security administration.

See also  AMD CPUs impacted by 18-year-old SMM flaw that allows firmware implants
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular